Malware Analysis Report

2025-08-05 19:17

Sample ID 240513-mnllpaae9t
Target b2f0a599f21caa5a88ae2e2cf08befb0_NeikiAnalytics
SHA256 8de9c9beb6f09e75660d9bdfe5fde9935ec30c8eef91ff521a71b02bb16efaeb
Tags
evasion persistence
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

8de9c9beb6f09e75660d9bdfe5fde9935ec30c8eef91ff521a71b02bb16efaeb

Threat Level: Known bad

The file b2f0a599f21caa5a88ae2e2cf08befb0_NeikiAnalytics was found to be: Known bad.

Malicious Activity Summary

evasion persistence

Modifies visiblity of hidden/system files in Explorer

Executes dropped EXE

Loads dropped DLL

Checks computer location settings

Adds Run key to start application

Unsigned PE

Enumerates physical storage devices

Suspicious behavior: EnumeratesProcesses

Suspicious use of WriteProcessMemory

Suspicious use of SetWindowsHookEx

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-05-13 10:36

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-13 10:36

Reported

2024-05-13 10:39

Platform

win7-20240221-en

Max time kernel

132s

Max time network

121s

Command Line

"C:\Users\Admin\AppData\Local\Temp\b2f0a599f21caa5a88ae2e2cf08befb0_NeikiAnalytics.exe"

Signatures

Modifies visiblity of hidden/system files in Explorer

evasion
Description Indicator Process Target
Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" C:\Users\Admin\AppData\Local\Temp\b2f0a599f21caa5a88ae2e2cf08befb0_NeikiAnalytics.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" C:\Users\Admin\neuet.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\neuet.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\neuet = "C:\\Users\\Admin\\neuet.exe /s" C:\Users\Admin\neuet.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\neuet = "C:\\Users\\Admin\\neuet.exe /h" C:\Users\Admin\neuet.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\neuet = "C:\\Users\\Admin\\neuet.exe /a" C:\Users\Admin\neuet.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\neuet = "C:\\Users\\Admin\\neuet.exe /v" C:\Users\Admin\neuet.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\neuet = "C:\\Users\\Admin\\neuet.exe /e" C:\Users\Admin\neuet.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\neuet = "C:\\Users\\Admin\\neuet.exe /a" C:\Users\Admin\AppData\Local\Temp\b2f0a599f21caa5a88ae2e2cf08befb0_NeikiAnalytics.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\neuet = "C:\\Users\\Admin\\neuet.exe /d" C:\Users\Admin\neuet.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\neuet = "C:\\Users\\Admin\\neuet.exe /z" C:\Users\Admin\neuet.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\neuet = "C:\\Users\\Admin\\neuet.exe /f" C:\Users\Admin\neuet.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\neuet = "C:\\Users\\Admin\\neuet.exe /y" C:\Users\Admin\neuet.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\neuet = "C:\\Users\\Admin\\neuet.exe /l" C:\Users\Admin\neuet.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\neuet = "C:\\Users\\Admin\\neuet.exe /b" C:\Users\Admin\neuet.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\neuet = "C:\\Users\\Admin\\neuet.exe /m" C:\Users\Admin\neuet.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\neuet = "C:\\Users\\Admin\\neuet.exe /w" C:\Users\Admin\neuet.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\neuet = "C:\\Users\\Admin\\neuet.exe /c" C:\Users\Admin\neuet.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\neuet = "C:\\Users\\Admin\\neuet.exe /x" C:\Users\Admin\neuet.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\neuet = "C:\\Users\\Admin\\neuet.exe /k" C:\Users\Admin\neuet.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\neuet = "C:\\Users\\Admin\\neuet.exe /t" C:\Users\Admin\neuet.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\neuet = "C:\\Users\\Admin\\neuet.exe /p" C:\Users\Admin\neuet.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\neuet = "C:\\Users\\Admin\\neuet.exe /g" C:\Users\Admin\neuet.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\neuet = "C:\\Users\\Admin\\neuet.exe /r" C:\Users\Admin\neuet.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\neuet = "C:\\Users\\Admin\\neuet.exe /o" C:\Users\Admin\neuet.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\neuet = "C:\\Users\\Admin\\neuet.exe /i" C:\Users\Admin\neuet.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\neuet = "C:\\Users\\Admin\\neuet.exe /u" C:\Users\Admin\neuet.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\neuet = "C:\\Users\\Admin\\neuet.exe /n" C:\Users\Admin\neuet.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\neuet = "C:\\Users\\Admin\\neuet.exe /j" C:\Users\Admin\neuet.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\neuet = "C:\\Users\\Admin\\neuet.exe /q" C:\Users\Admin\neuet.exe N/A

Enumerates physical storage devices

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\b2f0a599f21caa5a88ae2e2cf08befb0_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\neuet.exe N/A
N/A N/A C:\Users\Admin\neuet.exe N/A
N/A N/A C:\Users\Admin\neuet.exe N/A
N/A N/A C:\Users\Admin\neuet.exe N/A
N/A N/A C:\Users\Admin\neuet.exe N/A
N/A N/A C:\Users\Admin\neuet.exe N/A
N/A N/A C:\Users\Admin\neuet.exe N/A
N/A N/A C:\Users\Admin\neuet.exe N/A
N/A N/A C:\Users\Admin\neuet.exe N/A
N/A N/A C:\Users\Admin\neuet.exe N/A
N/A N/A C:\Users\Admin\neuet.exe N/A
N/A N/A C:\Users\Admin\neuet.exe N/A
N/A N/A C:\Users\Admin\neuet.exe N/A
N/A N/A C:\Users\Admin\neuet.exe N/A
N/A N/A C:\Users\Admin\neuet.exe N/A
N/A N/A C:\Users\Admin\neuet.exe N/A
N/A N/A C:\Users\Admin\neuet.exe N/A
N/A N/A C:\Users\Admin\neuet.exe N/A
N/A N/A C:\Users\Admin\neuet.exe N/A
N/A N/A C:\Users\Admin\neuet.exe N/A
N/A N/A C:\Users\Admin\neuet.exe N/A
N/A N/A C:\Users\Admin\neuet.exe N/A
N/A N/A C:\Users\Admin\neuet.exe N/A
N/A N/A C:\Users\Admin\neuet.exe N/A
N/A N/A C:\Users\Admin\neuet.exe N/A
N/A N/A C:\Users\Admin\neuet.exe N/A
N/A N/A C:\Users\Admin\neuet.exe N/A
N/A N/A C:\Users\Admin\neuet.exe N/A
N/A N/A C:\Users\Admin\neuet.exe N/A
N/A N/A C:\Users\Admin\neuet.exe N/A
N/A N/A C:\Users\Admin\neuet.exe N/A
N/A N/A C:\Users\Admin\neuet.exe N/A
N/A N/A C:\Users\Admin\neuet.exe N/A
N/A N/A C:\Users\Admin\neuet.exe N/A
N/A N/A C:\Users\Admin\neuet.exe N/A
N/A N/A C:\Users\Admin\neuet.exe N/A
N/A N/A C:\Users\Admin\neuet.exe N/A
N/A N/A C:\Users\Admin\neuet.exe N/A
N/A N/A C:\Users\Admin\neuet.exe N/A
N/A N/A C:\Users\Admin\neuet.exe N/A
N/A N/A C:\Users\Admin\neuet.exe N/A
N/A N/A C:\Users\Admin\neuet.exe N/A
N/A N/A C:\Users\Admin\neuet.exe N/A
N/A N/A C:\Users\Admin\neuet.exe N/A
N/A N/A C:\Users\Admin\neuet.exe N/A
N/A N/A C:\Users\Admin\neuet.exe N/A
N/A N/A C:\Users\Admin\neuet.exe N/A
N/A N/A C:\Users\Admin\neuet.exe N/A
N/A N/A C:\Users\Admin\neuet.exe N/A
N/A N/A C:\Users\Admin\neuet.exe N/A
N/A N/A C:\Users\Admin\neuet.exe N/A
N/A N/A C:\Users\Admin\neuet.exe N/A
N/A N/A C:\Users\Admin\neuet.exe N/A
N/A N/A C:\Users\Admin\neuet.exe N/A
N/A N/A C:\Users\Admin\neuet.exe N/A
N/A N/A C:\Users\Admin\neuet.exe N/A
N/A N/A C:\Users\Admin\neuet.exe N/A
N/A N/A C:\Users\Admin\neuet.exe N/A
N/A N/A C:\Users\Admin\neuet.exe N/A
N/A N/A C:\Users\Admin\neuet.exe N/A
N/A N/A C:\Users\Admin\neuet.exe N/A
N/A N/A C:\Users\Admin\neuet.exe N/A
N/A N/A C:\Users\Admin\neuet.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\b2f0a599f21caa5a88ae2e2cf08befb0_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\neuet.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\b2f0a599f21caa5a88ae2e2cf08befb0_NeikiAnalytics.exe

"C:\Users\Admin\AppData\Local\Temp\b2f0a599f21caa5a88ae2e2cf08befb0_NeikiAnalytics.exe"

C:\Users\Admin\neuet.exe

"C:\Users\Admin\neuet.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 ns1.chopstickers.com udp
US 54.209.32.212:8000 ns1.chopstickers.com tcp

Files

\Users\Admin\neuet.exe

MD5 52a339d766167f60aee784d8c700a4f9
SHA1 e654e3cd304de7cbc9c7236447fd1199d70b8cd8
SHA256 e130e0c21559ca193aea0f697b56555c82774d947095fdb6e2e3de4f4f1f6198
SHA512 e71e0434131fc0e1f6b8666df313e24f5911c1e6caece6ae61ed3739f2ac1ff1322aa20f52fa796c59622361355f0b9398160f1e92655ccf997d9a16186a554d

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-13 10:36

Reported

2024-05-13 10:39

Platform

win10v2004-20240508-en

Max time kernel

110s

Max time network

150s

Command Line

"C:\Users\Admin\AppData\Local\Temp\b2f0a599f21caa5a88ae2e2cf08befb0_NeikiAnalytics.exe"

Signatures

Modifies visiblity of hidden/system files in Explorer

evasion
Description Indicator Process Target
Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" C:\Users\Admin\kiuroi.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" C:\Users\Admin\AppData\Local\Temp\b2f0a599f21caa5a88ae2e2cf08befb0_NeikiAnalytics.exe N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\b2f0a599f21caa5a88ae2e2cf08befb0_NeikiAnalytics.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\kiuroi.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiuroi = "C:\\Users\\Admin\\kiuroi.exe /e" C:\Users\Admin\kiuroi.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiuroi = "C:\\Users\\Admin\\kiuroi.exe /i" C:\Users\Admin\kiuroi.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiuroi = "C:\\Users\\Admin\\kiuroi.exe /s" C:\Users\Admin\kiuroi.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiuroi = "C:\\Users\\Admin\\kiuroi.exe /d" C:\Users\Admin\kiuroi.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiuroi = "C:\\Users\\Admin\\kiuroi.exe /x" C:\Users\Admin\kiuroi.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiuroi = "C:\\Users\\Admin\\kiuroi.exe /r" C:\Users\Admin\kiuroi.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiuroi = "C:\\Users\\Admin\\kiuroi.exe /v" C:\Users\Admin\kiuroi.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiuroi = "C:\\Users\\Admin\\kiuroi.exe /f" C:\Users\Admin\kiuroi.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiuroi = "C:\\Users\\Admin\\kiuroi.exe /j" C:\Users\Admin\kiuroi.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiuroi = "C:\\Users\\Admin\\kiuroi.exe /k" C:\Users\Admin\AppData\Local\Temp\b2f0a599f21caa5a88ae2e2cf08befb0_NeikiAnalytics.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiuroi = "C:\\Users\\Admin\\kiuroi.exe /p" C:\Users\Admin\kiuroi.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiuroi = "C:\\Users\\Admin\\kiuroi.exe /o" C:\Users\Admin\kiuroi.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiuroi = "C:\\Users\\Admin\\kiuroi.exe /t" C:\Users\Admin\kiuroi.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiuroi = "C:\\Users\\Admin\\kiuroi.exe /z" C:\Users\Admin\kiuroi.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiuroi = "C:\\Users\\Admin\\kiuroi.exe /h" C:\Users\Admin\kiuroi.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiuroi = "C:\\Users\\Admin\\kiuroi.exe /l" C:\Users\Admin\kiuroi.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiuroi = "C:\\Users\\Admin\\kiuroi.exe /g" C:\Users\Admin\kiuroi.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiuroi = "C:\\Users\\Admin\\kiuroi.exe /q" C:\Users\Admin\kiuroi.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiuroi = "C:\\Users\\Admin\\kiuroi.exe /w" C:\Users\Admin\kiuroi.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiuroi = "C:\\Users\\Admin\\kiuroi.exe /k" C:\Users\Admin\kiuroi.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiuroi = "C:\\Users\\Admin\\kiuroi.exe /y" C:\Users\Admin\kiuroi.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiuroi = "C:\\Users\\Admin\\kiuroi.exe /b" C:\Users\Admin\kiuroi.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiuroi = "C:\\Users\\Admin\\kiuroi.exe /u" C:\Users\Admin\kiuroi.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiuroi = "C:\\Users\\Admin\\kiuroi.exe /n" C:\Users\Admin\kiuroi.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiuroi = "C:\\Users\\Admin\\kiuroi.exe /m" C:\Users\Admin\kiuroi.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiuroi = "C:\\Users\\Admin\\kiuroi.exe /c" C:\Users\Admin\kiuroi.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kiuroi = "C:\\Users\\Admin\\kiuroi.exe /a" C:\Users\Admin\kiuroi.exe N/A

Enumerates physical storage devices

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\b2f0a599f21caa5a88ae2e2cf08befb0_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\b2f0a599f21caa5a88ae2e2cf08befb0_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\kiuroi.exe N/A
N/A N/A C:\Users\Admin\kiuroi.exe N/A
N/A N/A C:\Users\Admin\kiuroi.exe N/A
N/A N/A C:\Users\Admin\kiuroi.exe N/A
N/A N/A C:\Users\Admin\kiuroi.exe N/A
N/A N/A C:\Users\Admin\kiuroi.exe N/A
N/A N/A C:\Users\Admin\kiuroi.exe N/A
N/A N/A C:\Users\Admin\kiuroi.exe N/A
N/A N/A C:\Users\Admin\kiuroi.exe N/A
N/A N/A C:\Users\Admin\kiuroi.exe N/A
N/A N/A C:\Users\Admin\kiuroi.exe N/A
N/A N/A C:\Users\Admin\kiuroi.exe N/A
N/A N/A C:\Users\Admin\kiuroi.exe N/A
N/A N/A C:\Users\Admin\kiuroi.exe N/A
N/A N/A C:\Users\Admin\kiuroi.exe N/A
N/A N/A C:\Users\Admin\kiuroi.exe N/A
N/A N/A C:\Users\Admin\kiuroi.exe N/A
N/A N/A C:\Users\Admin\kiuroi.exe N/A
N/A N/A C:\Users\Admin\kiuroi.exe N/A
N/A N/A C:\Users\Admin\kiuroi.exe N/A
N/A N/A C:\Users\Admin\kiuroi.exe N/A
N/A N/A C:\Users\Admin\kiuroi.exe N/A
N/A N/A C:\Users\Admin\kiuroi.exe N/A
N/A N/A C:\Users\Admin\kiuroi.exe N/A
N/A N/A C:\Users\Admin\kiuroi.exe N/A
N/A N/A C:\Users\Admin\kiuroi.exe N/A
N/A N/A C:\Users\Admin\kiuroi.exe N/A
N/A N/A C:\Users\Admin\kiuroi.exe N/A
N/A N/A C:\Users\Admin\kiuroi.exe N/A
N/A N/A C:\Users\Admin\kiuroi.exe N/A
N/A N/A C:\Users\Admin\kiuroi.exe N/A
N/A N/A C:\Users\Admin\kiuroi.exe N/A
N/A N/A C:\Users\Admin\kiuroi.exe N/A
N/A N/A C:\Users\Admin\kiuroi.exe N/A
N/A N/A C:\Users\Admin\kiuroi.exe N/A
N/A N/A C:\Users\Admin\kiuroi.exe N/A
N/A N/A C:\Users\Admin\kiuroi.exe N/A
N/A N/A C:\Users\Admin\kiuroi.exe N/A
N/A N/A C:\Users\Admin\kiuroi.exe N/A
N/A N/A C:\Users\Admin\kiuroi.exe N/A
N/A N/A C:\Users\Admin\kiuroi.exe N/A
N/A N/A C:\Users\Admin\kiuroi.exe N/A
N/A N/A C:\Users\Admin\kiuroi.exe N/A
N/A N/A C:\Users\Admin\kiuroi.exe N/A
N/A N/A C:\Users\Admin\kiuroi.exe N/A
N/A N/A C:\Users\Admin\kiuroi.exe N/A
N/A N/A C:\Users\Admin\kiuroi.exe N/A
N/A N/A C:\Users\Admin\kiuroi.exe N/A
N/A N/A C:\Users\Admin\kiuroi.exe N/A
N/A N/A C:\Users\Admin\kiuroi.exe N/A
N/A N/A C:\Users\Admin\kiuroi.exe N/A
N/A N/A C:\Users\Admin\kiuroi.exe N/A
N/A N/A C:\Users\Admin\kiuroi.exe N/A
N/A N/A C:\Users\Admin\kiuroi.exe N/A
N/A N/A C:\Users\Admin\kiuroi.exe N/A
N/A N/A C:\Users\Admin\kiuroi.exe N/A
N/A N/A C:\Users\Admin\kiuroi.exe N/A
N/A N/A C:\Users\Admin\kiuroi.exe N/A
N/A N/A C:\Users\Admin\kiuroi.exe N/A
N/A N/A C:\Users\Admin\kiuroi.exe N/A
N/A N/A C:\Users\Admin\kiuroi.exe N/A
N/A N/A C:\Users\Admin\kiuroi.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\b2f0a599f21caa5a88ae2e2cf08befb0_NeikiAnalytics.exe N/A
N/A N/A C:\Users\Admin\kiuroi.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\b2f0a599f21caa5a88ae2e2cf08befb0_NeikiAnalytics.exe

"C:\Users\Admin\AppData\Local\Temp\b2f0a599f21caa5a88ae2e2cf08befb0_NeikiAnalytics.exe"

C:\Users\Admin\kiuroi.exe

"C:\Users\Admin\kiuroi.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 72.32.126.40.in-addr.arpa udp
NL 23.62.61.72:443 www.bing.com tcp
US 8.8.8.8:53 205.47.74.20.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 72.61.62.23.in-addr.arpa udp
US 8.8.8.8:53 ns1.chopstickers.com udp
US 8.8.8.8:53 86.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 77.190.18.2.in-addr.arpa udp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
US 8.8.8.8:53 98.56.20.217.in-addr.arpa udp
US 8.8.8.8:53 22.236.111.52.in-addr.arpa udp
US 8.8.8.8:53 4.173.189.20.in-addr.arpa udp

Files

C:\Users\Admin\kiuroi.exe

MD5 0d1caa8586ebb92b7a225a864938a085
SHA1 13c4df44425cfda0b6b7372d0852f0d881ae332f
SHA256 5c9c4a5d41b2e28220cf1b2318138925a13e4473543344b2a073760fdefd093f
SHA512 d3b8e9f05d637fc4ef7a4357cc94974e9c2919c845c5a0f4b5c50fd6aeb9e892f7eec732f6e4e2e5e83b68e638d9d1843bada39f82f8bff6494459aa51f4db9d